Implementation of Lightweight Machine Learning-Based Intrusion Detection System On IoT Devices of Smart Homes
Implementation of Lightweight Machine Learning-Based Intrusion Detection System On IoT Devices of Smart Homes
Article
Implementation of Lightweight Machine Learning-Based
Intrusion Detection System on IoT Devices of Smart Homes
Abbas Javed 1 , Amna Ehtsham 1 , Muhammad Jawad 1,2 , Muhammad Naeem Awais 1 , Ayyaz-ul-Haq Qureshi 3, *
and Hadi Larijani 4
Abstract: Smart home devices, also known as IoT devices, provide significant convenience; however,
they also present opportunities for attackers to jeopardize homeowners’ security and privacy. Se-
curing these IoT devices is a formidable challenge because of their limited computational resources.
Machine learning-based intrusion detection systems (IDSs) have been implemented on the edge and
the cloud; however, IDSs have not been embedded in IoT devices. To address this, we propose a
novel machine learning-based two-layered IDS for smart home IoT devices, enhancing accuracy and
computational efficiency. The first layer of the proposed IDS is deployed on a microcontroller-based
smart thermostat, which uploads the data to a website hosted on a cloud server. The second layer
of the IDS is deployed on the cloud side for classification of attacks. The proposed IDS can detect
the threats with an accuracy of 99.50% at cloud level (multiclassification). For real-time testing, we
Citation: Javed, A.; Ehtsham, A.; implemented the Raspberry Pi 4-based adversary to generate a dataset for man-in-the-middle (MITM)
Jawad, M.; Awais, M.N.; Qureshi, and denial of service (DoS) attacks on smart thermostats. The results show that the XGBoost-based
A.-u.-H.; Larijani, H. Implementation IDS detects MITM and DoS attacks in 3.51 ms on a smart thermostat with an accuracy of 97.59%.
of Lightweight Machine
Learning-Based Intrusion Detection
Keywords: intrusion detection system; embedded machine learning; TinyML; internet of things;
System on IoT Devices of Smart
machine learning; cloud computing; edge machine learning
Homes. Future Internet 2024, 16, 200.
https://doi.org/10.3390/fi16060200
cloud services and mobile apps. However, this remote accessibility of IoT devices in smart
homes presents numerous opportunities for attackers, especially considering that most
occupants have limited knowledge of security measures [4]. Securing such devices proves
challenging and complex due to their limited storage and computational power.
Several machine learning and deep learning algorithms have been studied for in-
trusion detection [5–9]. All the aforementioned papers discuss a centralized approach.
A few researchers also presented distributed approaches for intrusion detection in IoT
applications [10–13].
Researchers utilized fog computing in [13–16] for implementing IDSs in fog but
employed desktop PCs for the implementation. Similarly, in [17], the authors employed
Raspberry Pi for binary class IDS implementation on a fog node. Raspberry Pi-based edge
devices were also used for IDS implementation in [18,19]. In [20], the authors utilized
Google Edge TPU and Raspberry Pi for IDS implementation on the edge, while in [21], the
authors developed an IDS for mobile edge computing (MEC), but the proposed technique
was tested on a desktop computer. Due to limited resources, the authors implemented a
binary class IDS on an edge device [20,21].
The researchers used edge devices (Raspberry Pi/Desktop PCs/gateways), fog, and
the cloud for implementing the IDS due to the availability of network traffic analyzers,
such as Wireshark (https://www.wireshark.org (accessed on 26 April 2024)) and tcpdump
(https://www.tcpdump.org/(accessed on 26 April 2024)) but an ML-based IDS is not
embedded in IoT devices. Due to limited processing power, the lightweight IP (lwIP) (https:
//github.com/espressif/esp-lwip(accessed on 26 April 2024)) library for ESP32 (https:
//www.espressif.com/en/products/socs/esp32(accessed on 26 April 2024)) has restricted
access to network features. Consequently, implementing an IDS on a microcontroller-based
device without using network traffic analyzer software is an exceedingly challenging task.
In this paper, we have implemented a real-world scenario in which we employed a smart
thermostat using ESP32, an HTTP page on a cloud server (http://16.170.215.67/display
(accessed on 26 April 2024)), and a Raspberry Pi-based adversary node for generating
denial of service (DoS) and man-in-the-middle (MITM) attacks to collect a dataset called
the intrusion detection in smart homes (IDSH) dataset [22]. The dataset is collected by
using lwip and socket library for an ESP32 microcontroller. An ML-based binary class IDS
is embedded in a smart thermostat using TinyML [23], which is responsible for monitoring
room temperature and controlling HVAC systems. Additionally, this smart thermostat
connects to WiFi and uploads air temperature and humidity data to a hosted web page on
a cloud-based web services server, where an ML-based multiclass IDS is also deployed. To
enhance the security of the microcontroller-based smart thermostat, we propose deploying
a lightweight IDS based on XGBoost. Considering that IoT devices in smart homes connect
to WiFi routers, they become susceptible to various security risks, including DoS, DDoS,
MITM, ransomware, and scanning attacks. The main research objective of this research
article is to develop an IDS for IoT devices (a smart thermostat in our case) of smart
homes which are directly communicating with web servers through WiFi access points and
additional hardware (Raspberry Pi-based edge device) is not available. Therefore, in this
work, we proposed a two-layered ML-based IDS which can protect the smart thermostat by
embedding an IDS in the smart thermostat and can also protect the cloud by implementing
the IDS on the cloud.
The main contributions of this paper are as follows:
• A novel bi-directional computationally efficient ML-based decentralized multiclass
IDS is proposed for the deployment on IoT devices and the cloud.
• An embedded XGBoost-based IDS for real-time binary classification of attacks in smart
thermostats using TinyML is proposed. Moreover, a thorough comparison is made for
ANN-, XGBoost-, RF-, and DT-based IDS implementation on low-cost microcontroller-
based IoT devices for binary classification. The algorithms are compared in terms of
accuracy, inference time, and storage requirement.
Future Internet 2024, 16, 200 3 of 22
2. Related Work
An IoT system is vulnerable to different types of attacks [2]. These attacks are explained
in detail in [24] and include password cracking attacks, ransomware, port scanning, MITM
attacks, DoS/DDoS attacks, backdoors, injection attacks, and XSS attacks. A password
cracking attack is launched against a device to guess its password using a commonly
available set of passwords online. A ransomware attack is launched to lock a device’s data
and demand money in exchange for the data. A port scanning attack is used to check which
port on a device is open to launch an attack against that port. An MITM attack is used
to intercept traffic between any two nodes in the network. A DoS/DDoS attack is used
to occupy bandwidth in a network. For example, a device or a set of devices is directed
toward a single server to send false queries, making the server unresponsive to the actual
queries. A backdoor attack is launched to use/hack devices without anyone knowing. A
hacker who launches a backdoor attack has full access to the device. Injection/XSS attacks
are launched against web pages to alter their data.
Recently, in [25], the authors calculated the energy consumption of running DT-, RF-,
and ANN-based ML models for intrusion detection in IoT devices using the TinyML library.
However, the energy consumption is based on theoretical calculations, and the ML models
were not tested for real-world intrusion detection systems. The authors in [26] developed
an IoT device dataset by generating a botnet attack on a smart health service testbed. The
dataset is labeled as normal and attack traffic. The authors utilized Wireshark for collecting
the dataset. The results show that the accuracy of an RF-based IDS on the collected dataset
is 99.98%.
In [9], the TON_IoT dataset [27] is used to train multiple ML algorithms for intrusion
detection in intelligent transportation systems, where the XGBoost algorithm outperforms
other ML algorithms with an accuracy of 99.92%. In [28], the authors developed an
enhanced anomaly-based intrusion detection method (EIDM) for classifying 15 attacks
with an accuracy of 95%. The first application of random neural networks (RNNs) for IDSs
was proposed in our previous work [29] in which an RNN with an artificial bee colony
algorithm is used for binary classification of intrusion detection in the cloud. In [30], the
authors developed an IDS using the hybrid deep learning model. The proposed technique
achieved 96% accuracy, but it incurred a high computational burden. In [31], a five-stack
ResNet was used as a deep learning method, trained on two different datasets: N-BaIoT
and the power system dataset.
The authors in [32] proposed to implement ensemble ML model selection on the cloud
and IDS implementation on fog for real-time prediction to reduce the attack detection
time. In [33], a distributed IDS approach is presented. Attacks were classified as normal or
attack at the fog node. If identified as an attack, further classification occurs at the cloud
Future Internet 2024, 16, 200 4 of 22
node. The DNN-KNN algorithm showcased accuracies of 99.77% and 99.85% on NSL-KDD
and CICIDS2017, respectively. In [34], a fog computing-based distributed IDS approach
is introduced. Data are analyzed for attacks at the fog node, and if detected, relevant
information is stored in the cloud server for subsequent action. In [16], an anomaly-based
IDS is moved to fog nodes, and the Distributed Smart Space Orchestration System (DS2OS)
dataset is used to train different ML algorithms. RF showed an accuracy of 99.99%. A
distributed IDS using fog computing is designed in [35] to detect DDoS attacks in the
memory pool of a blockchain-enabled IoT network. The performance of the proposed IDS
is evaluated using machine learning algorithms (RF and XGBoost) and evaluation metrics
on an actual IoT-based BoT-IoT dataset containing various recent botnet attacks.
In [19], the authors presented Passban, an intelligent IDS for edge devices. The IDS was
deployed on an IoT gateway developed with Raspberry Pi 3. Passban successfully detected
HTTP and SSH brute force, port scanning, and SYN flood attacks. Another IDS, named
IoT-KEEPER, is proposed in [18], capable of detecting MITM, DoS, and scanning attacks at
the IoT gateway. The authors tested IoT-KEEPER’s performance on Raspberry Pi 3.
In [36], an IDS is introduced to secure edge IoT devices, operating in two phases. In
the first phase, features are extracted and then these features are trained using the DNN
algorithm. This system presents an accuracy of 99.23% and an F1-score of 99.27%. In [37],
an edge-of-things computing-based intrusion detection mechanism is presented. The best
accuracy achieved by this network is 88.4%.
The literature review above has discussed both centralized and decentralized ap-
proaches deployed on the edge, fog, and cloud sides. To effectively implement an IDS
on the edge and fog sides, it needs to be both accurate and computationally efficient in
promptly detecting attacks. Successfully detecting intrusions on the edge/fog side of an IoT
network could proactively save cloud resources from further proliferation. Additionally,
detailed studies on IDSs for IoT devices, developed with microcontrollers having limited
computation resources, are lacking. There has been no study evaluating the feasibility of
embedding an IDS on both IoT devices and the cloud side.
3.4. Implementation of Adversary for Real-Time Testing and IDSH Dataset Collection
The ToN_IoT dataset contains thermostat data, including temperature, thermostat
status, timestamp, date, label, and type. However, this dataset is not generalized and
may not be suitable for smart home applications operating in different environmental
conditions. In addition to sensor data, every data packet sent through a network by an
IoT device contains additional information, such as connectivity and network protocols.
This provides raw information about the internal and external activity of these IoT devices,
complementing sensor data. In this study, we used network features, such as connection
activity, statistical activity, and DNS activity, to train the IDS deployed on IoT devices.
For IDS implementation on the IoT devices in our smart home, specifically, the smart
thermostat, we generated our own dataset named the IDSH dataset, available on Kag-
gle [22]. This dataset combines sensor data, thermostat status, and network features (i.e.,
connection activity and statistical activity) for MITM, DoS, and normal traffic.
The smart thermostat is designed to monitor the indoor temperature and humidity of
the room and control the air conditioner by sending ON/OFF signals. The temperature
and humidity are measured by the thermostat using a DHT22 sensor. These measurements
are sent to a web application via an HTTP POST request, which receives the data and
displays the indoor temperature on the webpage. Additionally, the user can control the air
conditioner remotely through the web application by sending ON/OFF commands.
In this work for testing the accuracy of an IDS deployed on a smart thermostat, the
adversary is implemented with Kali Linux scripts running on Raspberry Pi 4. The attacker
node generates the MITM, and DoS attacks on the smart thermostat communicating with
the cloud server for data uploading and control signal input. The attacker node carried
out MITM using Address Resolution Protocol (ARP) spoofing and DoS attacks on the
smart thermostat by flooding them with the high volume of traffic and requests. The smart
thermostat does not have access to packet analyzer tools like Wireshark and tcpdump
for extracting network features. Therefore, we utilized the Esp32 lwIP library and socket
library to extract real-time network parameters. The block diagram of the smart thermostat
for collecting the dataset is shown in Figure 2. The parameters of the dataset collected at
each step are shown in Figure 2.
Future Internet 2024, 16, 200 8 of 22
Table 2. Cont.
4. Results
This section covers a discussion of various ML algorithms used for implementing an
IDS on the cloud, followed by the presentation of ML-based IDS results on IoT devices
(smart thermostat). Additionally, this section provides details on the implementation of
ML algorithms on a microcontroller using the TinyML library [23]. Various ML models are
trained to be deployed on the cloud side of an IoT network with and without FS techniques.
The TON_IoT dataset is used to train the XGBoost, LSTM, Conv1d, MLP, and RF algorithms
and their results are discussed in this section. For implementation on a smart thermostat
(edge device), XGBoost is compared with DT, RF, and ANN in terms of accuracy, storage
requirement, and computational delay. The highlighted values, in bold in the tables, denote
the models with superior performance. Finally, the accuracy of the IDS is also evaluated for
MITM and DoS attacks on the smart thermostat generated by the adversary.
Future Internet 2024, 16, 200 10 of 22
Table 3. Test results of the LSTM and Conv1d models for IDS implementation on cloud.
ML Learning
Models Configuration Details Epochs Accuracy Precision Recall F1-Score
Models Rate
LSTM Model1 Layers = 2, Layer1,2 = 100 neurons 50 0.001 94.2% 0.83 0.82 0.82
Layers = 2, Layer1 = 120 neurons,
LSTM Model2 50 0.001 94.01% 0.83 0.83 0.83
Layer2 = 100 neurons
Layers = 2, Layer1 = 180 neurons,
LSTM Model3 50 0.001 94.02% 0.84 0.82 0.82
Layer2 = 140 neurons
Layers = 3, Layer1 = 180 neurons,
LSTM Model4 Layer2 = 140 neurons, 50 0.001 93.87% 0.84 0.80 0.81
Layer3 = 100 neurons
Conv1d Model1 Layers = 2, Kernel size = 3, Filters = 64,32 50 0.001 79.8% 0.59 0.59 0.57
Layers = 3, Kernel size = 3,
Conv1d Model2 50 0.001 73% 0.41 0.41 0.40
Filters = 64, 32 , Layer3 = 100 neurons
Conv1d Model3 Layers = 1, Kernel size = 3, Filters = 32 50 0.001 76.5% 0.59 0.49 0.50
Conv1d Model4 Layers = 1, Kernel size = 5, Filters = 32 50 0.001 79% 0.48 0.52 0.45
Conv1d Model5 Layers = 1, Kernel size = 5, Filters = 64 50 0.001 80% 0.55 0.53 0.515
Conv1d Model6 Layers = 1, Kernel size = 7, Filters = 64 50 0.001 83.28% 0.65 0.60 0.59
that Model2 showed the best results with a testing accuracy of 99.4%, precision of 0.95,
recall of 0.97, and F1-score of 0.96.
Table 4. Test results of RF, XGBoost, and MLP models evaluated for IDS implementation on cloud.
Table 5. Test results of LSTM-, RF-, MLP-, XGBoost-based IDSs with FS methods.
4.2.5. Comparison of XGBOOST-, LSTM-, RF-, and MLP-Based IDS on the Cloud with
FS Techniques
FS involves choosing a subset of the most informative features from the original set
while reducing dimensionality. It aims to retain the semantic interpretability of the selected
features. In contrast, FE transforms the original features into a new low-dimensional space
using mathematical projection. Although it effectively reduces dimensionality, the extracted
features lose their intuitive meanings.
For an IDS, FS allows the creation of a lightweight and efficient IDS by carefully
selecting relevant original features. On the other hand, FE techniques provide a valuable
way to transform and distill the essence of the original feature set, reducing overall data
dimensionality while preserving critical information. Both FS and FE are essential tools for
enhancing the cybersecurity posture of IoT ecosystems, ensuring effective threat detection
tailored to the limitations and intricacies of IoT devices and networks.
Two FS/FE techniques, i.e., PCA and chi-square, are applied to the XGBoost-, LSTM-,
RF-, and MLP-based IDSs. The results for LSTM showed that chi-square performed best
with 15 out of 40 selected features, achieving a detection accuracy of 94.5%. With RF, PCA
proved to be the most effective technique, resulting in a detection accuracy of 97.5% using
25 features. Similarly, for MLP, PCA resulted in the best detection accuracy of 94% with
15 features. XGBoost trained with features selected by chi-square gave the best results.
With 25 features, the accuracy is 98.35%, while with 15 features the accuracy is 98.13%. The
results above indicate that the highest training accuracy attained with the FS/FE technique
is 98.35%, whereas without using FS/FE, it reaches 99.5%. While reducing features might
reduce prediction time for an IDS, prioritizing accuracy remains crucial for effective IDS
implementation, even if it means retaining a higher number of features. Therefore, the
XGBoost-based IDS without FS/FE outperformed the other ML-based IDSs evaluated in
this study.
We compared the inference times of the FS and FE techniques. We analyzed the
inference times of the XGBoost models trained with both FS and FE as shown in Table 6.
The simulations are carried out on Intel(R) Core(TM) i5-8250U CPU with 8GB RAM. The
inference time of XGBoost without FS/FE is 0.6631 milliseconds. The chi-square method
(FS) showed a higher inference time compared to the PCA method (FE). Overall, the
inference time with FS/FE was more than double that of the XGBoost model without them.
While FS/FE reduced the inference time of XGBoost compared to no FS, real-time
testing considers the combined time of both FS/FE and XGBoost inference. Importantly, FS
is a one-time calculation performed during training. In the testing phase, directly selecting
the top features from the high-dimensional data for dimensionality reduction can be a
preferred choice. However, applying FS to real-time captured packets incurs a higher time
cost than XGBoost inference itself.
Our discussions and results align with the detailed research presented in [42,43]. For
time-critical attacks like DoS/DDoS and MitM, a low inference time is crucial for the IDS.
Therefore, we deployed the XGBoost model (estimator = 150) without FS/FE due to its
superior accuracy and faster inference time.
Future Internet 2024, 16, 200 14 of 22
is not feasible to implement the RF model with 200 estimators since the required memory
is not available on an ESP32-based edge device. The ANN model-based IDS is also studied
in this work. Two-layered and three-layered ANN models are used for the IDS. The best
accuracy achieved with the ANN model (Layer 1 = 96, Layer 2 = 64, Layer 3 = 32) is 98.93%.
Table 7. IDS implementation on microcontroller-based IoT device using ToN_IoT dataset (connection,
statistical, and DNS activity features).
Due to the limited storage and computational power of the microcontroller-based edge
device, our objective is to identify an IDS that can deliver accurate results within a shorter
time frame. The XGBoost-based IDS has proven superior to DT, RF, and ANN in terms
of accuracy, FNR, and FPR. The highest accuracy achieved by the XGBoost-based IDS is
99.92%, but it requires 3002.78 µs for threat detection. In contrast, XGBoost’s performance
is only 0.07% better than DT, yet DT completes computations in 11.36 µs. Considering DT’s
significantly quicker detection time compared to XGBoost, it could be the preferred choice
Future Internet 2024, 16, 200 16 of 22
for implementing the IDS on edge devices. However, the accuracy of the IDS is crucial.
Therefore, XGBoost should be preferred for the implementation of the IDS.
Figure 3. Comparison of XGBoost-, RF-, DT-, and ANN-based IDS implementation on smart thermo-
stat using Ton_IoT dataset.
Future Internet 2024, 16, 200 17 of 22
Table 8. IDS implementation on edge using connection and statistical activity features of
TON_IoT dataset.
Figure 4. Comparison of XGBoost-, RF-, DT-, and ANN-based IDS implementation on smart thermo-
stat using IDSH dataset.
4.5. Discussion
In this study, the IDS is deployed on a smart thermostat built with the ESP32 micro-
controller. The microcontroller boasts 440 KB of ROM and 520 KB of SRAM for program
memory and instructions, respectively.
We conducted an initial feasibility test by implementing the IDS, incorporating con-
nection activity, statistical activity, and DNS activity features. Utilizing XGBoost, the IDS
consumed 82.71% of program memory and required 3002.78 µs to compute the output.
Conversely, the IDS implemented with RF consumed 79.0% of program memory and took
1565.01 µs for computation. Similarly, the IDS implemented with ANN utilized 76.15% of
program memory and took 296.12 µs for computation. Notably, DT outperformed XGBoost,
ANN, and RF in terms of program memory and inference time, consuming just 66.73% of
program memory and requiring only 11.37 µs for computation.
We also implemented the IDS using connection and statistical activity features. The most
efficient XGBoost model utilized 76.38% of program storage and took 2056.2 µs for compu-
tation. Following closely in accuracy, the DT model consumed 65.74% of program memory
with an inference time of only 3.2 µs. In contrast, RF consumed 75.68% of program memory
with an inference time of 1312.4 µs. The ANN model, ranking fourth in accuracy, consumed
75.87% of program memory with an inference time of 242.8 µs.
Furthermore, we implemented the IDS with the IDSH dataset, which combines sensor
and network datasets. The highest accuracy achieved by XGBoost (estimator = 100, depth = 8)
is 97.66% but with an inference time of 3515.9 µs, whereas with XGBoost (estimator = 50,
depth = 8), the IDS consumed 77.0% of program memory with an inference time of 1502.3 µs.
The RF model consumed 80.96% of program memory with an inference time of 3314.4 µs,
while the DT model consumed 66.78% of program memory with an inference time of 8.0 mi-
Future Internet 2024, 16, 200 20 of 22
croseconds. The ANN model consumed 75.28% of program memory with an inference time
of 2498.1 µs. It is noteworthy that for the IDSH dataset, the XGBoost models with estimators
of 150 and above encountered memory constraints preventing their implementation on the
smart thermostat.
DT operates on a simpler model, making decisions based on if–else rules at each node,
which requires less computation time compared to the matrix multiplications and activity
functions utilized in XGBOOST, ANN, and RF. As a result, the inference time of DT is less
than that of XGBOOST, ANN, and RF. However, XGBoost captures complex relations in the
data and handles non-linear patterns more effectively. Moreover, it possesses the capability
to consider both past and future covariates present in the input data. The internal feature
of hyperparameter tuning further contributes to its higher accuracy, making XGBoost’s
accuracy superior.
Table 9 and Figure 4 present the results of the IDS deployed on the smart thermostat
device using our IDSH dataset. The trained ML models were embedded in the ESP32
microcontroller-based smart thermostat, and the inference time was calculated after gen-
erating attacks from our Raspberry Pi-based attacker node. Based on these results, we
determined that the inference time of XGBoost exceeds that of DT. However, given that the
building dynamics are slow and a delay of a few milliseconds in HVAC control input will
not significantly impact the indoor environment, we prioritize accuracy. Therefore, for the
smart thermostat, the XGBoost (estimator = 50, depth = 8)-based IDS is embedded in the
smart thermostat for intrusion detection.
access of the lwIP library to network parameters, we managed to retrieve only a limited set
of network parameters on the microcontroller. In the future, we will work on extracting
additional network parameters at the IoT device.
Author Contributions: All authors contributed extensively to the work presented in this paper.
Conceptualization, A.J., A.-u.-H.Q., and H.L; methodology, A.J., A.E., M.J. and M.N.A.; software, A.J.,
A.E. and M.J.; validation, A.J., A.E., M.J., M.N.A., A.-u.-H.Q. and H.L.; formal analysis, A.J., H.L.,
M.N.A., M.J. and A.-u.-H.Q.; investigation, A.J., M.N.A., H.L. and A.-u.-H.Q.; resources, A.J., A.E. and
A.-u.-H.Q.; data curation, A.J., A.E., M.N.A., H.L. and M.J.; writing—original draft preparation, A.J.,
A.E., M.J. and A.-u.-H.Q.; writing—review and editing, A.J., A.E., M.J., M.N.A., H.L. and A.-u.-H.Q.;
visualization, A.J., M.N.A. and A.-u.-H.Q.; supervision, A.J. and A.-u.-H.Q.; project administration,
A.J. and A.-u.-H.Q.; funding acquisition, A.J. and A.-u.-H.Q. All authors have read and agreed to the
published version of the manuscript.
Funding: The APC was funded by Department of Cyber Security and Networks, School of Computing,
Engineering and Built Environment, Glasgow Caledonian University, UK
Data Availability Statement: https://www.kaggle.com/datasets/bc7c97914edab17a5821f5b27f4
65904bad79132f07cfcefc83e9669daeb3f98(accessed on 26 April 2024.) Shorturl http://surl.li/psyjo
(accessed on 26 April 2024.)
Conflicts of Interest: The authors declare no conflicts of interest.
References
1. IoT.Business.News. Number of Connected IOT Devices Growing 9% to 12.3 Billion Globally, Cellular IOT Now Surpassing 2
Billion. Available online: https://iotbusinessnews.com/2021/09/23/13465-number-of-connected-iot-devices-growing-9-to-12
-3-billion-globally-cellular-iot-now-surpassing-2-billion/ (accessed on 24 January 2024).
2. Hassija, V.; Chamola, V.; Saxena, V.; Jain, D.; Goyal, P.; Sikdar, B. A survey on IoT security: Application areas, security threats,
and solution architectures. IEEE Access 2019, 7, 82721–82743. [CrossRef]
3. Singh, S.; Ra, I.H.; Meng, W.; Kaur, M.; Cho, G.H. SH-BlockCC: A secure and efficient Internet of things smart home architecture
based on cloud computing and blockchain technology. Int. J. Distrib. Sens. Netw. 2019, 15, 1550147719844159. [CrossRef]
4. Sohail, S.; Fan, Z.; Gu, X.; Sabrina, F. Multi-tiered Artificial Neural Networks model for intrusion detection in smart homes. Intell.
Syst. Appl. 2022, 16, 200152. [CrossRef]
5. Ferrag, M.A.; Maglaras, L.; Ahmim, A.; Derdour, M.; Janicke, H. Rdtids: Rules and decision tree-based intrusion detection system
for internet-of-things networks. Future Internet 2020, 12, 44. [CrossRef]
6. Mighan, S.N.; Kahani, M. A novel scalable intrusion detection system based on deep learning. Int. J. Inf. Secur. 2021, 20, 387–403.
[CrossRef]
7. Ahmed, S.; Khan, Z.A.; Mohsin, S.M.; Latif, S.; Aslam, S.; Mujlid, H.; Adil, M.; Najam, Z. Effective and efficient DDoS attack
detection using deep learning algorithm, multi-layer perceptron. Future Internet 2023, 15, 76. [CrossRef]
8. Zhong, M.; Zhou, Y.; Chen, G. Sequential model based intrusion detection system for IoT servers using deep learning methods.
Sensors 2021, 21, 1113. [CrossRef]
9. Gad, A.R.; Nashat, A.A.; Barkat, T.M. Intrusion detection system using machine learning for vehicular ad hoc networks based on
ToN-IoT dataset. IEEE Access 2021, 9, 142206–142217. [CrossRef]
10. Meidan, Y.; Avraham, D.; Libhaber, H.; Shabtai, A. CADeSH: Collaborative anomaly detection for smart homes. IEEE Internet
Things J. 2022, 10, 8514–8532. [CrossRef]
11. Shi, L.; Wu, L.; Guan, Z. Three-layer hybrid intrusion detection model for smart home malicious attacks. Comput. Electr. Eng.
2021, 96, 107536. [CrossRef]
12. Thakur, S.; Chakraborty, A.; De, R.; Kumar, N.; Sarkar, R. Intrusion detection in cyber-physical systems using a generic and
domain specific deep autoencoder model. Comput. Electr. Eng. 2021, 91, 107044. [CrossRef]
13. Rahman, M.A.; Asyhari, A.T.; Leong, L.; Satrya, G.; Tao, M.H.; Zolkipli, M. Scalable machine learning-based intrusion detection
system for IoT-enabled smart cities. Sustain. Cities Soc. 2020, 61, 102324. [CrossRef]
14. Reddy, D.K.K.; Behera, H.S.; Nayak, J.; Naik, B.; Ghosh, U.; Sharma, P.K. Exact greedy algorithm based split finding approach for
intrusion detection in fog-enabled IoT environment. J. Inf. Secur. Appl. 2021, 60, 102866. [CrossRef]
15. Labiod, Y.; Amara Korba, A.; Ghoualmi, N. Fog computing-based intrusion detection architecture to protect iot networks. Wirel.
Pers. Commun. 2022, 125, 231–259. [CrossRef]
16. Kumar, P.; Gupta, G.P.; Tripathi, R. Design of anomaly-based intrusion detection system using fog computing for IoT network.
Autom. Control Comput. Sci. 2021, 55, 137–147. [CrossRef]
17. Pacheco, J.; Benitez, V.H.; Felix-Herran, L.C.; Satam, P. Artificial neural networks-based intrusion detection system for internet of
things fog nodes. IEEE Access 2020, 8, 73907–73918. [CrossRef]
Future Internet 2024, 16, 200 22 of 22
18. Hafeez, I.; Antikainen, M.; Ding, A.Y.; Tarkoma, S. IoT-KEEPER: Detecting malicious IoT network activity using online traffic
analysis at the edge. IEEE Trans. Netw. Serv. Manag. 2020, 17, 45–59. [CrossRef]
19. Eskandari, M.; Janjua, Z.H.; Vecchio, M.; Antonelli, F. Passban IDS: An Intelligent Anomaly-Based Intrusion Detection System for
IoT Edge Devices. IEEE Internet Things J. 2020, 7, 6882–6897. . [CrossRef]
20. Hosseininoorbin, S.; Layeghy, S.; Sarhan, M.; Jurdak, R.; Portmann, M. Exploring edge TPU for network intrusion detection in
IoT. J. Parallel Distrib. Comput. 2023, 179, 104712. [CrossRef]
21. Bangui, H.; Buhnova, B. Lightweight intrusion detection for edge computing networks using deep forest and bio-inspired
algorithms. Comput. Electr. Eng. 2022, 100, 107901. . [CrossRef]
22. Javed, A. Intrusion Detection in Smart Homes (IDSH) Dataset. Available online: https://www.kaggle.com/datasets/bc7c97914
edab17a5821f5b27f465904bad79132f07cfcefc83e9669daeb3f98 (accessed on 24 January 2024).
23. TensorFlow Lite TinyML for ESP32. Available online: https://eloquentarduino.com/posts/tensorflow-lite-tinyml-esp32
(accessed on 30 March 2024).
24. Suresh, P.; Daniel, J.V.; Parthasarathy, V.; Aswathy, R. A state of the art review on the Internet of Things (IoT) history, technology
and fields of deployment. In Proceedings of the 2014 International Conference on Science Engineering and Management Research
(ICSEMR), Chennai, India, 27–29 November 2014; pp. 1–8.
25. Tekin, N.; Acar, A.; Aris, A.; Uluagac, A.S.; Gungor, V.C. Energy consumption of on-device machine learning models for IoT
intrusion detection. Internet Things 2023, 21, 100670. [CrossRef]
26. Koirala, A.; Bista, R.; Ferreira, J.C. Enhancing IoT device security through network attack data analysis using machine learning
algorithms. Future Internet 2023, 15, 210. [CrossRef]
27. The TON_IoT Datasets: UNSW Research. Available online: https://research.unsw.edu.au/projects/toniot-datasets (accessed on
30 April 2024).
28. Elnakib, O.; Shaaban, E.; Mahmoud, M.; Emara, K. EIDM: Deep learning model for IoT intrusion detection systems. J. Supercomput.
2023, 79, 13241–13261. [CrossRef]
29. Qureshi, A.U.H.; Larijani, H.; Mtetwa, N.; Javed, A.; Ahmad, J. RNN-ABC: A new swarm optimization based technique for
anomaly detection. Computers 2019, 8, 59. [CrossRef]
30. Sahu, A.K.; Sharma, S.; Tanveer, M.; Raja, R. Internet of Things attack detection using hybrid Deep Learning Model. Comput.
Commun. 2021, 176, 146–154. [CrossRef]
31. Alotaibi, B.; Alotaibi, M. A stacked deep learning approach for IoT cyberattack detection. J. Sens. 2020, 2020, 8828591. [CrossRef]
32. Tomer, V.; Sharma, S. Detecting iot attacks using an ensemble machine learning model. Future Internet 2022, 14, 102. [CrossRef]
33. De Souza, C.A.; Westphall, C.B.; Machado, R.B.; Sobral, J.B.M.; dos Santos Vieira, G. Hybrid approach to intrusion detection in
fog-based IoT environments. Comput. Netw. 2020, 180, 107417. [CrossRef]
34. Kumar, P.; Gupta, G.P.; Tripathi, R. A distributed ensemble design based intrusion detection system using fog computing to
protect the internet of things networks. J. Ambient. Intell. Humaniz. Comput. 2021, 12, 9555–9572. [CrossRef]
35. Kumar, R.; Kumar, P.; Tripathi, R.; Gupta, G.P.; Garg, S.; Hassan, M.M. A distributed intrusion detection system to detect DDoS
attacks in blockchain-enabled IoT network. J. Parallel Distrib. Comput. 2022, 164, 55–68. [CrossRef]
36. Nasir, M.; Javed, A.R.; Tariq, M.A.; Asim, M.; Baker, T. Feature engineering and deep learning-based intrusion detection
framework for securing edge IoT. J. Supercomput. 2022, 78, 8852–8866. [CrossRef]
37. Almogren, A.S. Intrusion detection in Edge-of-Things computing. J. Parallel Distrib. Comput. 2020, 137, 259–265. [CrossRef]
38. Hindy, H.; Bayne, E.; Bures, M.; Atkinson, R.; Tachtatzis, C.; Bellekens, X. Machine learning based IoT intrusion detection system:
An MQTT case study (MQTT-IoT-IDS2020 dataset). In Selected Papers from the 12th International Networking Conference: INC 2020;
Springer: Berlin/Heidelberg, Germany, 2021; pp. 73–84.
39. Koroniotis, N.; Moustafa, N.; Sitnikova, E.; Turnbull, B. Towards the development of realistic botnet dataset in the internet of
things for network forensic analytics: Bot-iot dataset. Future Gener. Comput. Syst. 2019, 100, 779–796. [CrossRef]
40. Pearson, K.X. On the criterion that a given system of deviations from the probable in the case of a correlated system of variables
is such that it can be reasonably supposed to have arisen from random sampling. London Edinburgh Dublin Philos. Mag. J. Sci.
1900, 50, 157–175. [CrossRef]
41. Hotelling, H. Analysis of a complex of statistical variables into principal components. J. Educ. Psychol. 1933, 24, 417. [CrossRef]
42. Li, J.; Othman, M.S.; Chen, H.; Yusuf, L.M. Optimizing IoT intrusion detection system: Feature selection versus feature extraction
in machine learning. J. Big Data 2024, 11, 36. [CrossRef]
43. Ngo, V.D.; Vuong, T.C.; Van Luong, T.; Tran, H. Machine learning-based intrusion detection: Feature selection versus feature
extraction. Clust. Comput. 2023, 27, 2365–2379. [CrossRef]
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual
author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to
people or property resulting from any ideas, methods, instructions or products referred to in the content.